Proving the Security of AES Substitution-Permutation Network.
Thomas BaignèresSerge VaudenayPublished in: Selected Areas in Cryptography (2005)
Keyphrases
- security threats
- network management
- computer networks
- security protection
- security measures
- encryption algorithms
- communication networks
- network connection
- peer to peer
- intrusion detection and prevention
- enterprise network
- network administrators
- denial of service attacks
- security problems
- application level
- information security
- network layer
- cryptographic algorithms
- cyber attacks
- security issues
- virtual private network
- wireless sensor networks